NMAP and SQLMAP FOR ETHICAL HACKERS

Published 2022-05-06
Platform Udemy
Rating 5.00
Number of Reviews 1
Number of Students 5
Price $19.99
Instructors
Ali N F
Subjects

Go to Udemy

Cybersecurity tools nmap, sqlmap and nikto

In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following:

fingerprinting OS services running on target host.

discovering hosts with TCP SYN ping scan

Discovering hosts with UDP SYN ping scan

Os detection in verbose mode.

Discovering hosts with IP, ICMP and ARP ping scan.

Aggressive mode scan os guessing

intense scan

discovering host names by brute-forcing DNS records.

getting information from whois record.

reason scan

scan an entire subnet.

HTTP Enumeration

FTP Enumeration

DNS Enumeration

SSH Enumeration

SMB Enumeration

SMTP Enumeration

MYSQL Enumeration

IP address geolocation

Trace out geolocation.

Then start with sqlmap and they learn and do the following:

Access Databases names

Access databases tables

Access databases columns

dump data from data bases columns

Access passwords and passwords hashes from databases.

Access information schema of databases.

In the last part, students will learn Nikto and do the following:

Nikto basic scan

scan specific port with Nikto.

scan domain with SSL enabled

scan multiple targets with nikto

output nikto scan result.


Go to Udemy